2007
DOI: 10.1109/mc.2007.344
|View full text |Cite
|
Sign up to set email alerts
|

Embedded System Design for Automotive Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
68
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(68 citation statements)
references
References 15 publications
0
68
0
Order By: Relevance
“…High-assurance control software for cyber physical systems has received much attention recently (e.g., [32,3,24,23,22,10,12]). Focusing on robust controller implementation, [32] and [22] provide simulation-based robustness analysis tools, while [3,24,10,12] studies issues related to fixed-point controller design.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…High-assurance control software for cyber physical systems has received much attention recently (e.g., [32,3,24,23,22,10,12]). Focusing on robust controller implementation, [32] and [22] provide simulation-based robustness analysis tools, while [3,24,10,12] studies issues related to fixed-point controller design.…”
Section: Related Workmentioning
confidence: 99%
“…Focusing on robust controller implementation, [32] and [22] provide simulation-based robustness analysis tools, while [3,24,10,12] studies issues related to fixed-point controller design. [4] presents a theorem proving method to verify the control related properties of Simulink models.…”
Section: Related Workmentioning
confidence: 99%
“…RTOS is used here to assign the priorities. Application code designed on an RTOS [11] can be quite diverse, ranging from a simple application for a digital stopwatch to a much more complex application for aircraft navigation [10]. Here Micro C/OS II is used to assign the priorities [5].…”
Section: Introductionmentioning
confidence: 99%
“…Being aware that priority-based scheduling can lead to discontinuous behavior in time and timing anomalies [2], timing isolation in software execution is required to protect safety-critical embedded systems from timing faults.…”
Section: Introductionmentioning
confidence: 99%